[<prev] [next>] [day] [month] [year] [list]
Message-ID: <202306190512.F00Ve0zD-lkp@intel.com>
Date: Mon, 19 Jun 2023 05:19:22 +0800
From: kernel test robot <lkp@...el.com>
To: "Masami Hiramatsu (Google)" <mhiramat@...nel.org>
Cc: llvm@...ts.linux.dev, oe-kbuild-all@...ts.linux.dev,
linux-kernel@...r.kernel.org
Subject: kernel/trace/trace_eprobe.c:427:1: warning: stack frame size (1424)
exceeds limit (1024) in 'process_fetch_insn'
tree: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git master
head: 8c1f0c38b31025f60437215dd27fffc293565fa4
commit: b26a124cbfa80f42bfc4e63e1d5643ca98159d66 tracing/probes: Add symstr type for dynamic events
date: 6 months ago
config: riscv-randconfig-r011-20230619 (https://download.01.org/0day-ci/archive/20230619/202306190512.F00Ve0zD-lkp@intel.com/config)
compiler: clang version 17.0.0 (https://github.com/llvm/llvm-project.git 4a5ac14ee968ff0ad5d2cc1ffa0299048db4c88a)
reproduce: (https://download.01.org/0day-ci/archive/20230619/202306190512.F00Ve0zD-lkp@intel.com/reproduce)
If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <lkp@...el.com>
| Closes: https://lore.kernel.org/oe-kbuild-all/202306190512.F00Ve0zD-lkp@intel.com/
All warnings (new ones prefixed by >>):
>> kernel/trace/trace_eprobe.c:427:1: warning: stack frame size (1424) exceeds limit (1024) in 'process_fetch_insn' [-Wframe-larger-than]
427 | process_fetch_insn(struct fetch_insn *code, void *rec, void *dest,
| ^
kernel/trace/trace_eprobe.c:561:13: warning: stack frame size (1584) exceeds limit (1024) in 'eprobe_trigger_func' [-Wframe-larger-than]
561 | static void eprobe_trigger_func(struct event_trigger_data *data,
| ^
2 warnings generated.
--
>> kernel/trace/trace_uprobe.c:218:1: warning: stack frame size (1440) exceeds limit (1024) in 'process_fetch_insn' [-Wframe-larger-than]
218 | process_fetch_insn(struct fetch_insn *code, void *rec, void *dest,
| ^
1 warning generated.
vim +/process_fetch_insn +427 kernel/trace/trace_eprobe.c
7491e2c442781a Tzvetomir Stoyanov (VMware 2021-08-19 424)
7491e2c442781a Tzvetomir Stoyanov (VMware 2021-08-19 425) /* Note that we don't verify it, since the code does not come from user space */
7491e2c442781a Tzvetomir Stoyanov (VMware 2021-08-19 426) static int
7491e2c442781a Tzvetomir Stoyanov (VMware 2021-08-19 @427) process_fetch_insn(struct fetch_insn *code, void *rec, void *dest,
7491e2c442781a Tzvetomir Stoyanov (VMware 2021-08-19 428) void *base)
7491e2c442781a Tzvetomir Stoyanov (VMware 2021-08-19 429) {
7491e2c442781a Tzvetomir Stoyanov (VMware 2021-08-19 430) unsigned long val;
7491e2c442781a Tzvetomir Stoyanov (VMware 2021-08-19 431)
6a832ec3d680b3 Steven Rostedt (Google 2022-08-20 432) retry:
6a832ec3d680b3 Steven Rostedt (Google 2022-08-20 433) switch (code->op) {
6a832ec3d680b3 Steven Rostedt (Google 2022-08-20 434) case FETCH_OP_TP_ARG:
7491e2c442781a Tzvetomir Stoyanov (VMware 2021-08-19 435) val = get_event_field(code, rec);
6a832ec3d680b3 Steven Rostedt (Google 2022-08-20 436) break;
6a832ec3d680b3 Steven Rostedt (Google 2022-08-20 437) case FETCH_OP_IMM:
6a832ec3d680b3 Steven Rostedt (Google 2022-08-20 438) val = code->immediate;
6a832ec3d680b3 Steven Rostedt (Google 2022-08-20 439) break;
6a832ec3d680b3 Steven Rostedt (Google 2022-08-20 440) case FETCH_OP_COMM:
6a832ec3d680b3 Steven Rostedt (Google 2022-08-20 441) val = (unsigned long)current->comm;
6a832ec3d680b3 Steven Rostedt (Google 2022-08-20 442) break;
6a832ec3d680b3 Steven Rostedt (Google 2022-08-20 443) case FETCH_OP_DATA:
6a832ec3d680b3 Steven Rostedt (Google 2022-08-20 444) val = (unsigned long)code->data;
6a832ec3d680b3 Steven Rostedt (Google 2022-08-20 445) break;
6a832ec3d680b3 Steven Rostedt (Google 2022-08-20 446) case FETCH_NOP_SYMBOL: /* Ignore a place holder */
6a832ec3d680b3 Steven Rostedt (Google 2022-08-20 447) code++;
6a832ec3d680b3 Steven Rostedt (Google 2022-08-20 448) goto retry;
6a832ec3d680b3 Steven Rostedt (Google 2022-08-20 449) default:
6a832ec3d680b3 Steven Rostedt (Google 2022-08-20 450) return -EILSEQ;
6a832ec3d680b3 Steven Rostedt (Google 2022-08-20 451) }
6a832ec3d680b3 Steven Rostedt (Google 2022-08-20 452) code++;
6a832ec3d680b3 Steven Rostedt (Google 2022-08-20 453) return process_fetch_insn_bottom(code, val, dest, base);
7491e2c442781a Tzvetomir Stoyanov (VMware 2021-08-19 454) }
7491e2c442781a Tzvetomir Stoyanov (VMware 2021-08-19 455) NOKPROBE_SYMBOL(process_fetch_insn)
7491e2c442781a Tzvetomir Stoyanov (VMware 2021-08-19 456)
:::::: The code at line 427 was first introduced by commit
:::::: 7491e2c442781a1860181adb5ab472a52075f393 tracing: Add a probe that attaches to trace events
:::::: TO: Tzvetomir Stoyanov (VMware) <tz.stoyanov@...il.com>
:::::: CC: Steven Rostedt (VMware) <rostedt@...dmis.org>
--
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests/wiki
Powered by blists - more mailing lists